Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-4028 (GCVE-0-2021-4028)
Vulnerability from cvelistv5
- CWE-416 - - Use After Free
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:16:04.248Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"tags": [
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20221228-0002/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "kernel",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in kernel 5.15-rc1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 - Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-28T00:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221228-0002/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2021-4028",
"datePublished": "2022-08-24T00:00:00",
"dateReserved": "2021-11-29T00:00:00",
"dateUpdated": "2024-08-03T17:16:04.248Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-4028\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-08-24T16:15:09.197\",\"lastModified\":\"2024-11-21T06:36:45.057\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.\"},{\"lang\":\"es\",\"value\":\"Un fallo en la implementaci\u00f3n del kernel de Linux del c\u00f3digo de escucha del administrador de comunicaciones RDMA permit\u00eda a un atacante con acceso local configurar un socket para que escuchara en un puerto alto, lo que permit\u00eda un uso de memoria previamente liberada de un elemento de la lista. Dada la capacidad de ejecutar c\u00f3digo, un atacante local podr\u00eda aprovechar este uso de memoria previamente liberada para bloquear el sistema o posiblemente escalar privilegios en el sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10\",\"versionEndExcluding\":\"5.10.71\",\"matchCriteriaId\":\"247858D3-F7A3-4645-8903-6EDFD43FB0E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.14.10\",\"matchCriteriaId\":\"1A437B0D-8305-4C72-B691-D26986A126CF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:15.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4160B6E-BB1D-4476-877E-5D8CA47226DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:15.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A1F863-4D18-45F9-86D5-91ED3B38EB47\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2021-4028\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2027201\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lkml.org/lkml/2021/10/4/697\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221228-0002/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2021-4028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2027201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lkml.org/lkml/2021/10/4/697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221228-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
rhsa-2022:2189
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2189",
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2189.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2189",
"initial_release_date": "2022-05-11T13:25:42+00:00",
"revision_history": [
{
"date": "2022-05-11T13:25:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T13:25:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.101.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.101.1.el7.src",
"product_id": "kernel-0:3.10.0-514.101.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.101.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.101.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.101.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
rhsa-2022_0777
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Intel QAT Kernel power up fix (BZ#2016436)\n\n* RHEL8: DFS provided SMB shares are not accessible following unprivileged access (BZ#2017176)\n\n* xfs: I_DONTCACHE flag is ignored [xfstests: xfs/177] (BZ#2028533)\n\n* spec: Support separate tools build (BZ#2031052)\n\n* block: update to upstream v5.14 (BZ#2034395)\n\n* Double free of kmalloc-64 cache struct ib_port-\u003epkey_group from module ib_core . (BZ#2038723)\n\n* RHEL8 - kvm: floating interrupts may get stuck (BZ#2040768)\n\n* Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041528)\n\n* Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042662)\n\n* DNS lookup failures when run two times in a row (BZ#2043547)\n\n* net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043549)\n\n* Windows guest random Bsod when \u0027hv-tlbflush\u0027 enlightenment is enabled (BZ#2048342)\n\n* OCP node XFS metadata corruption after numerous reboots (BZ#2049291)\n\n* ice: bug fix series for 8.6 (BZ#2051950)\n\n* SNO 4.9: NO-CARRIER on pod interface using VF on intel E810-C NIC; IAVF_ERR_ADMIN_QUEUE_ERROR (BZ#2052984)\n\n* ceph omnibus backport for RHEL-8.6.0 (BZ#2053724)\n\n* SCTP peel-off with SELinux and containers in OCP (BZ#2054111)\n\n* Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054116)\n\nEnhancement(s):\n\n* [Mellanox 8.5 FEAT] mlx5: drivers update upto Linux v5.12 [8.4.0.z] (BZ#2037730)\n\n* [MCHP 8.5 FEAT] Update smartpqi driver to latest upstream [None8.4.0.z] (BZ#2042498)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0777",
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "2050237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050237"
},
{
"category": "external",
"summary": "2052984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052984"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0777.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T18:14:08+00:00",
"generator": {
"date": "2024-11-22T18:14:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0777",
"initial_release_date": "2022-03-08T16:48:10+00:00",
"revision_history": [
{
"date": "2022-03-08T16:48:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T16:48:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T18:14:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.40.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.40.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-0516",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050237"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing check in ioctl allows kernel memory read/write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0516"
},
{
"category": "external",
"summary": "RHBZ#2050237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55"
}
],
"release_date": "2022-02-09T06:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "As the kvm.ko kernel module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install kvm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-kvm.conf\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: missing check in ioctl allows kernel memory read/write"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:0771
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z7 source tree (BZ#2042461)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0771",
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0771.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0771",
"initial_release_date": "2022-03-08T15:04:55+00:00",
"revision_history": [
{
"date": "2022-03-08T15:04:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T15:04:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.40.1.rt7.112.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:4896
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)\n\n* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)\n\n* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes:\n\n* elfutils package has been update within RHV-H Channel to match the same version released in RHEL (BZ#2038081)\n\n* Rebase package(s) to version 1.2.24\nFor highlights, important fixes, or notable enhancements: see bugs in \"Depend On\". (BZ#2057338)\n\n* Rebase package(s) to version: 4.5.0\n\nHighlights, important fixes, or notable enhancements: (BZ#2057342)\n\n* Rebase package(s) to version anaconda-33.16.6.6-1.el8\nFor highlights and important bug fixes: include UI change for blocking installation if root password is not set. (BZ#1899821)\n\n* Red hat Virtualization Host has been rebased on Red Hat Enterprise Linux 8.6 (BZ#1997074)\n\n* Previously, concurrent executions of LV refresh (lvchange) failed. This hindered simultaneous starts of virtual machines that have thin-provisioned disks based on the same disk on a block storage domain.\nIn this release, concurrent execution of LV refresh has been fixed in LVM2. (BZ#2020497)\n\n* Red Hat Virtualization Host has been rebased on latest Ceph 4.3 (BZ#2090138)\n\n* In previous releases systemtap package could have been installed on top of RHV-H from RHV-H channel. With 4.4 SP1 systemtap package installation is not supported anymore (BZ#2052963)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:4896",
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1899821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899821"
},
{
"category": "external",
"summary": "1997074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997074"
},
{
"category": "external",
"summary": "2020497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020497"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2038081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038081"
},
{
"category": "external",
"summary": "2052963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052963"
},
{
"category": "external",
"summary": "2056334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056334"
},
{
"category": "external",
"summary": "2056745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056745"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "2057338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057338"
},
{
"category": "external",
"summary": "2057342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057342"
},
{
"category": "external",
"summary": "2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "2067945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
},
{
"category": "external",
"summary": "2073310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
},
{
"category": "external",
"summary": "2081353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353"
},
{
"category": "external",
"summary": "2086834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086834"
},
{
"category": "external",
"summary": "2090138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090138"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4896.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]",
"tracking": {
"current_release_date": "2025-10-09T18:44:10+00:00",
"generator": {
"date": "2025-10-09T18:44:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:4896",
"initial_release_date": "2022-06-03T13:51:08+00:00",
"revision_history": [
{
"date": "2022-06-03T13:51:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-03T13:51:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:44:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "elfutils-0:0.186-1.el8.src",
"product": {
"name": "elfutils-0:0.186-1.el8.src",
"product_id": "elfutils-0:0.186-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils@0.186-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.24-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.24-1.el8ev.src",
"product_id": "imgbased-0:1.2.24-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product": {
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product_id": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-node-ng@4.4.2-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product": {
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product_id": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.0-202205291010_8.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "elfutils-devel-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-devel-0:0.186-1.el8.x86_64",
"product_id": "elfutils-devel-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-devel@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-client@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debugsource@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-client-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-libelf-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-libs-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.0-5.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.0-202205291010_8.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "imgbased-0:1.2.24-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.24-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.24-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.24-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.0-5.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product": {
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_id": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product": {
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_id": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-0:0.186-1.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src"
},
"product_reference": "elfutils-0:0.186-1.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-devel-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-devel-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src"
},
"product_reference": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.24-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.24-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.24-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src"
},
"product_reference": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch"
},
"product_reference": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch"
},
"product_reference": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067945"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug was introduced in zlib v1.2.2.2 through zlib v1.2.11, with the addition of the Z_FIXED option, which forces the use of fixed Huffman codes, rather than dynamic Huffman codes, allowing for a simpler decoder for special applications.\n\nThis bug is difficult to trigger, as Z_FIXED is usually only used in special circumstances.\n\nRsync does the compression in-transit using zlib. As rsync uses vulnerable zlib v1.2.8 package, which incorrectly handles memory when performing certain zlib compressing or deflating operations. This results in rsync to crash.\n\nNote - The issue wasn\u0027t publicly labelled as security vulnerability until 2022, but the fix was public since 2018.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-25032"
},
{
"category": "external",
"summary": "RHBZ#2067945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032"
}
],
"release_date": "2018-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2022-03-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2062202"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0778"
},
{
"category": "external",
"summary": "RHBZ#2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20220315.txt",
"url": "https://www.openssl.org/news/secadv/20220315.txt"
}
],
"release_date": "2022-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates"
},
{
"cve": "CVE-2022-1271",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-04-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073310"
}
],
"notes": [
{
"category": "description",
"text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gzip: arbitrary-file-write vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug was introduced in gzip-1.3.10 and is relatively hard to exploit.\n\nRed Hat Enterprise Linux 6 was affected but Out of Support Cycle because gzip was not listed in Red Hat Enterprise Linux 6 ELS Inclusion List.\nhttps://access.redhat.com/articles/4997301",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1271"
},
{
"category": "external",
"summary": "RHBZ#2073310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271"
}
],
"release_date": "2022-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gzip: arbitrary-file-write vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Pieter Agten"
],
"organization": "Fortanix"
}
],
"cve": "CVE-2022-24903",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2081353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsyslog\u0027s reception TCP modules. This flaw allows an attacker to craft a malicious message leading to a heap-based buffer overflow. This issue allows the attacker to corrupt or access data stored in memory, leading to a denial of service in the rsyslog or possible remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsyslog: Heap-based overflow in TCP syslog server",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24903"
},
{
"category": "external",
"summary": "RHBZ#2081353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903"
},
{
"category": "external",
"summary": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8",
"url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8"
}
],
"release_date": "2022-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsyslog: Heap-based overflow in TCP syslog server"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
RHSA-2022:1185
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1185",
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1185.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:23+00:00",
"generator": {
"date": "2025-10-09T21:42:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1185",
"initial_release_date": "2022-04-05T08:55:03+00:00",
"revision_history": [
{
"date": "2022-04-05T08:55:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T08:55:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T08:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T08:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022:0772
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0772",
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0772.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0772",
"initial_release_date": "2022-03-08T15:46:08+00:00",
"revision_history": [
{
"date": "2022-03-08T15:46:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T15:46:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debugsource@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debuginfo@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debugsource@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debuginfo@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debugsource@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debuginfo@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debugsource@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debuginfo@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debugsource@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debuginfo@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debugsource@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debuginfo@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debugsource@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debuginfo@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debugsource@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debuginfo@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:1550
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport DFS fixes from upstream (BZ#2056329)\n\n* [RHEL8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193)\n\n* nf_reinject calls nf_queue_entry_free on an already freed entry-\u003estate (BZ#2061446)\n\n* gfs2 blocking in gdlm_lock (BZ#2069750)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1550",
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1550.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:27+00:00",
"generator": {
"date": "2025-10-09T21:42:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1550",
"initial_release_date": "2022-04-26T22:22:36+00:00",
"revision_history": [
{
"date": "2022-04-26T22:22:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T22:22:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.23.1.el8_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product_id": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.23.1.el8_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.src",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T22:22:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T22:22:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022_0629
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernnel-rt-debug: do not call blocking ops when !TASK_RUNNING; state=1 set at [\u003c0000000050e86018\u003e] handle_userfault+0x530/0x1820 (BZ#2029420)\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z15 Batch (BZ#2046275)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0629",
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0629.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T10:48:47+00:00",
"generator": {
"date": "2024-11-15T10:48:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0629",
"initial_release_date": "2022-02-22T15:18:16+00:00",
"revision_history": [
{
"date": "2022-02-22T15:18:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T15:18:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:48:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.75.1.rt13.125.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
RHSA-2022:2188
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2188",
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2188.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2188",
"initial_release_date": "2022-05-11T13:28:33+00:00",
"revision_history": [
{
"date": "2022-05-11T13:28:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T13:28:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.100.1.el7.src",
"product_id": "kernel-0:3.10.0-693.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:28:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
}
]
}
RHSA-2022:0777
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Intel QAT Kernel power up fix (BZ#2016436)\n\n* RHEL8: DFS provided SMB shares are not accessible following unprivileged access (BZ#2017176)\n\n* xfs: I_DONTCACHE flag is ignored [xfstests: xfs/177] (BZ#2028533)\n\n* spec: Support separate tools build (BZ#2031052)\n\n* block: update to upstream v5.14 (BZ#2034395)\n\n* Double free of kmalloc-64 cache struct ib_port-\u003epkey_group from module ib_core . (BZ#2038723)\n\n* RHEL8 - kvm: floating interrupts may get stuck (BZ#2040768)\n\n* Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041528)\n\n* Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042662)\n\n* DNS lookup failures when run two times in a row (BZ#2043547)\n\n* net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043549)\n\n* Windows guest random Bsod when \u0027hv-tlbflush\u0027 enlightenment is enabled (BZ#2048342)\n\n* OCP node XFS metadata corruption after numerous reboots (BZ#2049291)\n\n* ice: bug fix series for 8.6 (BZ#2051950)\n\n* SNO 4.9: NO-CARRIER on pod interface using VF on intel E810-C NIC; IAVF_ERR_ADMIN_QUEUE_ERROR (BZ#2052984)\n\n* ceph omnibus backport for RHEL-8.6.0 (BZ#2053724)\n\n* SCTP peel-off with SELinux and containers in OCP (BZ#2054111)\n\n* Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054116)\n\nEnhancement(s):\n\n* [Mellanox 8.5 FEAT] mlx5: drivers update upto Linux v5.12 [8.4.0.z] (BZ#2037730)\n\n* [MCHP 8.5 FEAT] Update smartpqi driver to latest upstream [None8.4.0.z] (BZ#2042498)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0777",
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "2050237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050237"
},
{
"category": "external",
"summary": "2052984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052984"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0777.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0777",
"initial_release_date": "2022-03-08T16:48:10+00:00",
"revision_history": [
{
"date": "2022-03-08T16:48:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T16:48:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.40.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.40.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-0516",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050237"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing check in ioctl allows kernel memory read/write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0516"
},
{
"category": "external",
"summary": "RHBZ#2050237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55"
}
],
"release_date": "2022-02-09T06:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "As the kvm.ko kernel module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install kvm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-kvm.conf\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: missing check in ioctl allows kernel memory read/write"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_1198
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Adding new kernel entry in grub configuration file only after generation of new initramfs (BZ#1893756)\n\n* Cannot mount DFS shares on RHEL7 (BZ#1937304)\n\n* RHEL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware (BZ#1997156)\n\n* kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 (BZ#2028740)\n\n* Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c (BZ#2030609)\n\n* [RHEL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info (BZ#2042462)\n\n* REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. (BZ#2054743)\n\nEnhancement(s):\n\n* RHEL7.9 - kernel: Add support for CPU-MF counter second version 7 (BZ#2048920)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1198",
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1198.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-15T10:50:18+00:00",
"generator": {
"date": "2024-11-15T10:50:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1198",
"initial_release_date": "2022-04-05T17:30:30+00:00",
"revision_history": [
{
"date": "2022-04-05T17:30:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T17:30:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:50:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.62.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.62.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:30:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:30:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022:0636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* bpf: update to v5.7 (BZ#2019883)\n\n* Backport leftover migrate_disable BPF related change (BZ#2027687)\n\n* assuming atomic context at include/linux/filter.h:597 (BZ#2043427)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0636",
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0636.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0636",
"initial_release_date": "2022-02-22T15:58:52+00:00",
"revision_history": [
{
"date": "2022-02-22T15:58:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T15:58:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.75.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.75.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
RHSA-2022:1535
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1535",
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1535.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:26+00:00",
"generator": {
"date": "2025-10-09T21:42:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1535",
"initial_release_date": "2022-04-26T20:00:25+00:00",
"revision_history": [
{
"date": "2022-04-26T20:00:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T20:00:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debugsource@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debuginfo@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debugsource@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debuginfo@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debugsource@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debuginfo@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debugsource@1-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debuginfo@1-1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debugsource@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debuginfo@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debugsource@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debuginfo@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debugsource@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debuginfo@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debugsource@1-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debuginfo@1-1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T20:00:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T20:00:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022_1373
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1373",
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1373.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T14:46:38+00:00",
"generator": {
"date": "2024-11-15T14:46:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1373",
"initial_release_date": "2022-04-13T20:07:15+00:00",
"revision_history": [
{
"date": "2022-04-13T20:07:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-13T20:07:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:46:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:1263
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\n* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)\n\n* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)\n\n* expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution (CVE-2022-25236)\n\n* expat: Integer overflow in storeRawNames() (CVE-2022-25315)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHV-H has been rebased on RHEL-7.9.z #13 (BZ#2048409)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1263",
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "2041489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048409"
},
{
"category": "external",
"summary": "2055326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326"
},
{
"category": "external",
"summary": "2056363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363"
},
{
"category": "external",
"summary": "2056366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366"
},
{
"category": "external",
"summary": "2056370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370"
},
{
"category": "external",
"summary": "2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1263.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.22",
"tracking": {
"current_release_date": "2025-10-25T00:55:58+00:00",
"generator": {
"date": "2025-10-25T00:55:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2022:1263",
"initial_release_date": "2022-04-07T09:05:42+00:00",
"revision_history": [
{
"date": "2022-04-07T09:05:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-07T09:05:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-25T00:55:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.22-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.22-20220330.1.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
},
{
"cve": "CVE-2021-45417",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2041489"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aide: heap-based buffer overflow on outputs larger than B64_BUF",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45417"
},
{
"category": "external",
"summary": "RHBZ#2041489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417"
}
],
"release_date": "2022-01-20T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "aide: heap-based buffer overflow on outputs larger than B64_BUF"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2022-03-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2062202"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0778"
},
{
"category": "external",
"summary": "RHBZ#2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20220315.txt",
"url": "https://www.openssl.org/news/secadv/20220315.txt"
}
],
"release_date": "2022-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
},
{
"cve": "CVE-2022-24407",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2022-02-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2055326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SQL plugin shipped with Cyrus SASL. The vulnerability occurs due to failure to properly escape SQL input and leads to an improper input validation vulnerability. This flaw allows an attacker to execute arbitrary SQL commands and the ability to change the passwords for other accounts allowing escalation of privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24407"
},
{
"category": "external",
"summary": "RHBZ#2055326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407"
},
{
"category": "external",
"summary": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28",
"url": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28"
}
],
"release_date": "2022-02-22T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands"
},
{
"cve": "CVE-2022-25235",
"cwe": {
"id": "CWE-838",
"name": "Inappropriate Encoding for Output Context"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in expat. Passing malformed 2- and 3-byte UTF-8 sequences (for example, from start tag names) to the XML processing application on top of expat can lead to arbitrary code execution. This issue is dependent on how invalid UTF-8 is handled inside the XML processor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25235"
},
{
"category": "external",
"summary": "RHBZ#2056366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
},
{
"cve": "CVE-2022-25236",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056370"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in expat. Passing one or more namespace separator characters in the \"xmlns[:prefix]\" attribute values made expat send malformed tag names to the XML processor on top of expat. This issue causes arbitrary code execution depending on how unexpected cases are handled inside the XML processor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.\n\nThe xmlrpc-c component as shipped with Red Hat Enterprise Linux 8 is not affected by this issue as the issue could not be reproduced in this version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "RHBZ#2056370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
},
{
"cve": "CVE-2022-25315",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056363"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow was found in expat. The issue occurs in storeRawNames() by abusing the m_buffer expansion logic to allow allocations very close to INT_MAX and out-of-bounds heap writes. This flaw can cause a denial of service or potentially arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Integer overflow in storeRawNames()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25315"
},
{
"category": "external",
"summary": "RHBZ#2056363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Integer overflow in storeRawNames()"
}
]
}
rhsa-2022:2188
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2188",
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2188.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2188",
"initial_release_date": "2022-05-11T13:28:33+00:00",
"revision_history": [
{
"date": "2022-05-11T13:28:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T13:28:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.100.1.el7.src",
"product_id": "kernel-0:3.10.0-693.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:28:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
}
]
}
rhsa-2022:0958
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch-4_18_0-147_58_1 is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Several kpatch CVEs needed for kernel-4.18.0-147.58.1.el8_1 (BZ#2064297)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0958",
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0958.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch-4_18_0-147_58_1 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:25+00:00",
"generator": {
"date": "2025-10-09T21:12:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0958",
"initial_release_date": "2022-03-17T16:30:50+00:00",
"revision_history": [
{
"date": "2022-03-17T16:30:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-17T16:30:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
RHSA-2022:1263
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\n* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)\n\n* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)\n\n* expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution (CVE-2022-25236)\n\n* expat: Integer overflow in storeRawNames() (CVE-2022-25315)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHV-H has been rebased on RHEL-7.9.z #13 (BZ#2048409)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1263",
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "2041489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048409"
},
{
"category": "external",
"summary": "2055326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326"
},
{
"category": "external",
"summary": "2056363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363"
},
{
"category": "external",
"summary": "2056366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366"
},
{
"category": "external",
"summary": "2056370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370"
},
{
"category": "external",
"summary": "2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1263.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.22",
"tracking": {
"current_release_date": "2025-10-25T00:55:58+00:00",
"generator": {
"date": "2025-10-25T00:55:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2022:1263",
"initial_release_date": "2022-04-07T09:05:42+00:00",
"revision_history": [
{
"date": "2022-04-07T09:05:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-07T09:05:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-25T00:55:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.22-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.22-20220330.1.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
},
{
"cve": "CVE-2021-45417",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2041489"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aide: heap-based buffer overflow on outputs larger than B64_BUF",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45417"
},
{
"category": "external",
"summary": "RHBZ#2041489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417"
}
],
"release_date": "2022-01-20T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "aide: heap-based buffer overflow on outputs larger than B64_BUF"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2022-03-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2062202"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0778"
},
{
"category": "external",
"summary": "RHBZ#2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20220315.txt",
"url": "https://www.openssl.org/news/secadv/20220315.txt"
}
],
"release_date": "2022-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
},
{
"cve": "CVE-2022-24407",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2022-02-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2055326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SQL plugin shipped with Cyrus SASL. The vulnerability occurs due to failure to properly escape SQL input and leads to an improper input validation vulnerability. This flaw allows an attacker to execute arbitrary SQL commands and the ability to change the passwords for other accounts allowing escalation of privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24407"
},
{
"category": "external",
"summary": "RHBZ#2055326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407"
},
{
"category": "external",
"summary": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28",
"url": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28"
}
],
"release_date": "2022-02-22T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands"
},
{
"cve": "CVE-2022-25235",
"cwe": {
"id": "CWE-838",
"name": "Inappropriate Encoding for Output Context"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in expat. Passing malformed 2- and 3-byte UTF-8 sequences (for example, from start tag names) to the XML processing application on top of expat can lead to arbitrary code execution. This issue is dependent on how invalid UTF-8 is handled inside the XML processor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25235"
},
{
"category": "external",
"summary": "RHBZ#2056366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
},
{
"cve": "CVE-2022-25236",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056370"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in expat. Passing one or more namespace separator characters in the \"xmlns[:prefix]\" attribute values made expat send malformed tag names to the XML processor on top of expat. This issue causes arbitrary code execution depending on how unexpected cases are handled inside the XML processor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.\n\nThe xmlrpc-c component as shipped with Red Hat Enterprise Linux 8 is not affected by this issue as the issue could not be reproduced in this version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "RHBZ#2056370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
},
{
"cve": "CVE-2022-25315",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056363"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow was found in expat. The issue occurs in storeRawNames() by abusing the m_buffer expansion logic to allow allocations very close to INT_MAX and out-of-bounds heap writes. This flaw can cause a denial of service or potentially arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Integer overflow in storeRawNames()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25315"
},
{
"category": "external",
"summary": "RHBZ#2056363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Integer overflow in storeRawNames()"
}
]
}
rhsa-2022_1199
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z13 source tree (BZ#2059411)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1199",
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1199.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T10:50:11+00:00",
"generator": {
"date": "2024-11-15T10:50:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1199",
"initial_release_date": "2022-04-05T17:31:47+00:00",
"revision_history": [
{
"date": "2022-04-05T17:31:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T17:31:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:50:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.62.1.rt56.1203.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.62.1.rt56.1203.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:31:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:31:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022:0777
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Intel QAT Kernel power up fix (BZ#2016436)\n\n* RHEL8: DFS provided SMB shares are not accessible following unprivileged access (BZ#2017176)\n\n* xfs: I_DONTCACHE flag is ignored [xfstests: xfs/177] (BZ#2028533)\n\n* spec: Support separate tools build (BZ#2031052)\n\n* block: update to upstream v5.14 (BZ#2034395)\n\n* Double free of kmalloc-64 cache struct ib_port-\u003epkey_group from module ib_core . (BZ#2038723)\n\n* RHEL8 - kvm: floating interrupts may get stuck (BZ#2040768)\n\n* Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041528)\n\n* Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042662)\n\n* DNS lookup failures when run two times in a row (BZ#2043547)\n\n* net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043549)\n\n* Windows guest random Bsod when \u0027hv-tlbflush\u0027 enlightenment is enabled (BZ#2048342)\n\n* OCP node XFS metadata corruption after numerous reboots (BZ#2049291)\n\n* ice: bug fix series for 8.6 (BZ#2051950)\n\n* SNO 4.9: NO-CARRIER on pod interface using VF on intel E810-C NIC; IAVF_ERR_ADMIN_QUEUE_ERROR (BZ#2052984)\n\n* ceph omnibus backport for RHEL-8.6.0 (BZ#2053724)\n\n* SCTP peel-off with SELinux and containers in OCP (BZ#2054111)\n\n* Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054116)\n\nEnhancement(s):\n\n* [Mellanox 8.5 FEAT] mlx5: drivers update upto Linux v5.12 [8.4.0.z] (BZ#2037730)\n\n* [MCHP 8.5 FEAT] Update smartpqi driver to latest upstream [None8.4.0.z] (BZ#2042498)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0777",
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "2050237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050237"
},
{
"category": "external",
"summary": "2052984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052984"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0777.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0777",
"initial_release_date": "2022-03-08T16:48:10+00:00",
"revision_history": [
{
"date": "2022-03-08T16:48:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T16:48:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.40.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.40.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.40.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.40.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.40.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.40.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-0516",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050237"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing check in ioctl allows kernel memory read/write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0516"
},
{
"category": "external",
"summary": "RHBZ#2050237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55"
}
],
"release_date": "2022-02-09T06:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "As the kvm.ko kernel module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install kvm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-kvm.conf\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: missing check in ioctl allows kernel memory read/write"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T16:48:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.40.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.40.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.40.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
RHSA-2022:0629
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernnel-rt-debug: do not call blocking ops when !TASK_RUNNING; state=1 set at [\u003c0000000050e86018\u003e] handle_userfault+0x530/0x1820 (BZ#2029420)\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z15 Batch (BZ#2046275)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0629",
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0629.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:18+00:00",
"generator": {
"date": "2025-10-09T21:12:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0629",
"initial_release_date": "2022-02-22T15:18:16+00:00",
"revision_history": [
{
"date": "2022-02-22T15:18:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T15:18:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.75.1.rt13.125.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
rhsa-2022_1185
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1185",
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1185.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T10:50:02+00:00",
"generator": {
"date": "2024-11-15T10:50:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1185",
"initial_release_date": "2022-04-05T08:55:03+00:00",
"revision_history": [
{
"date": "2022-04-05T08:55:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T08:55:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:50:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T08:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T08:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
RHSA-2022:2211
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2211",
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2211.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2211",
"initial_release_date": "2022-05-11T18:59:08+00:00",
"revision_history": [
{
"date": "2022-05-11T18:59:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T18:59:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T18:59:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T18:59:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
RHSA-2022:0958
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch-4_18_0-147_58_1 is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Several kpatch CVEs needed for kernel-4.18.0-147.58.1.el8_1 (BZ#2064297)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0958",
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0958.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch-4_18_0-147_58_1 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:25+00:00",
"generator": {
"date": "2025-10-09T21:12:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0958",
"initial_release_date": "2022-03-17T16:30:50+00:00",
"revision_history": [
{
"date": "2022-03-17T16:30:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-17T16:30:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:0629
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernnel-rt-debug: do not call blocking ops when !TASK_RUNNING; state=1 set at [\u003c0000000050e86018\u003e] handle_userfault+0x530/0x1820 (BZ#2029420)\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z15 Batch (BZ#2046275)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0629",
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0629.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:18+00:00",
"generator": {
"date": "2025-10-09T21:12:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0629",
"initial_release_date": "2022-02-22T15:18:16+00:00",
"revision_history": [
{
"date": "2022-02-22T15:18:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T15:18:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.75.1.rt13.125.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.75.1.rt13.125.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:18:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.75.1.rt13.125.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
rhsa-2022:1185
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1185",
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1185.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:23+00:00",
"generator": {
"date": "2025-10-09T21:42:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1185",
"initial_release_date": "2022-04-05T08:55:03+00:00",
"revision_history": [
{
"date": "2022-04-05T08:55:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T08:55:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_59_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T08:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T08:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1185"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_59_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022:0851
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0851",
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0851.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:22+00:00",
"generator": {
"date": "2025-10-09T21:12:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0851",
"initial_release_date": "2022-03-14T10:22:02+00:00",
"revision_history": [
{
"date": "2022-03-14T10:22:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-14T10:22:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debugsource@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debuginfo@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debugsource@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debuginfo@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:0590
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0590",
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0590.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:18+00:00",
"generator": {
"date": "2025-10-09T21:12:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0590",
"initial_release_date": "2022-02-22T09:05:00+00:00",
"revision_history": [
{
"date": "2022-02-22T09:05:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T09:05:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
rhsa-2022:1198
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Adding new kernel entry in grub configuration file only after generation of new initramfs (BZ#1893756)\n\n* Cannot mount DFS shares on RHEL7 (BZ#1937304)\n\n* RHEL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware (BZ#1997156)\n\n* kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 (BZ#2028740)\n\n* Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c (BZ#2030609)\n\n* [RHEL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info (BZ#2042462)\n\n* REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. (BZ#2054743)\n\nEnhancement(s):\n\n* RHEL7.9 - kernel: Add support for CPU-MF counter second version 7 (BZ#2048920)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1198",
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1198.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T21:42:23+00:00",
"generator": {
"date": "2025-10-09T21:42:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1198",
"initial_release_date": "2022-04-05T17:30:30+00:00",
"revision_history": [
{
"date": "2022-04-05T17:30:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T17:30:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.62.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.62.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:30:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:30:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022:1199
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z13 source tree (BZ#2059411)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1199",
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1199.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:23+00:00",
"generator": {
"date": "2025-10-09T21:42:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1199",
"initial_release_date": "2022-04-05T17:31:47+00:00",
"revision_history": [
{
"date": "2022-04-05T17:31:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T17:31:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.62.1.rt56.1203.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.62.1.rt56.1203.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:31:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:31:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022:1373
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1373",
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1373.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:24+00:00",
"generator": {
"date": "2025-10-09T21:12:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1373",
"initial_release_date": "2022-04-13T20:07:15+00:00",
"revision_history": [
{
"date": "2022-04-13T20:07:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-13T20:07:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_0958
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch-4_18_0-147_58_1 is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Several kpatch CVEs needed for kernel-4.18.0-147.58.1.el8_1 (BZ#2064297)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0958",
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0958.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch-4_18_0-147_58_1 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:44:42+00:00",
"generator": {
"date": "2024-11-15T14:44:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0958",
"initial_release_date": "2022-03-17T16:30:50+00:00",
"revision_history": [
{
"date": "2022-03-17T16:30:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-17T16:30:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:44:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_58_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-17T16:30:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_58_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
RHSA-2022:0771
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z7 source tree (BZ#2042461)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0771",
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0771.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0771",
"initial_release_date": "2022-03-08T15:04:55+00:00",
"revision_history": [
{
"date": "2022-03-08T15:04:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T15:04:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.40.1.rt7.112.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:2186
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Extend /sys/devices/system/cpu/smt/* interface to all architectures [7.6.z] (BZ#2060991)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2186",
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2186.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2186",
"initial_release_date": "2022-05-11T16:44:20+00:00",
"revision_history": [
{
"date": "2022-05-11T16:44:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T16:44:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.src",
"product_id": "kernel-0:3.10.0-957.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T16:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T16:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
rhsa-2022_1324
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* guest using rtl8139 can not connect to network (BZ#2063889)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1324",
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1324.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:46:22+00:00",
"generator": {
"date": "2024-11-15T14:46:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1324",
"initial_release_date": "2022-04-12T15:52:54+00:00",
"revision_history": [
{
"date": "2022-04-12T15:52:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-12T15:52:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:46:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.66.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.66.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_1535
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1535",
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1535.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T14:48:18+00:00",
"generator": {
"date": "2024-11-15T14:48:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1535",
"initial_release_date": "2022-04-26T20:00:25+00:00",
"revision_history": [
{
"date": "2022-04-26T20:00:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T20:00:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:48:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debugsource@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debuginfo@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debugsource@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debuginfo@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debugsource@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debuginfo@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debugsource@1-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debuginfo@1-1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debugsource@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debuginfo@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debugsource@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debuginfo@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debugsource@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debuginfo@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debugsource@1-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debuginfo@1-1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T20:00:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T20:00:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022_0771
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z7 source tree (BZ#2042461)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0771",
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0771.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:43:10+00:00",
"generator": {
"date": "2024-11-15T14:43:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0771",
"initial_release_date": "2022-03-08T15:04:55+00:00",
"revision_history": [
{
"date": "2022-03-08T15:04:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T15:04:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:43:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.40.1.rt7.112.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.40.1.rt7.112.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:04:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.40.1.rt7.112.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_0772
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0772",
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0772.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T14:43:35+00:00",
"generator": {
"date": "2024-11-15T14:43:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0772",
"initial_release_date": "2022-03-08T15:46:08+00:00",
"revision_history": [
{
"date": "2022-03-08T15:46:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T15:46:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:43:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debugsource@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debuginfo@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debugsource@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debuginfo@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debugsource@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debuginfo@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debugsource@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debuginfo@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debugsource@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debuginfo@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debugsource@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debuginfo@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debugsource@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debuginfo@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debugsource@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debuginfo@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:2211
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2211",
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2211.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2211",
"initial_release_date": "2022-05-11T18:59:08+00:00",
"revision_history": [
{
"date": "2022-05-11T18:59:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T18:59:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T18:59:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T18:59:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
RHSA-2022:2189
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2189",
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2189.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2189",
"initial_release_date": "2022-05-11T13:25:42+00:00",
"revision_history": [
{
"date": "2022-05-11T13:25:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T13:25:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.101.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.101.1.el7.src",
"product_id": "kernel-0:3.10.0-514.101.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.101.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.101.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.101.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
rhsa-2022_2186
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Extend /sys/devices/system/cpu/smt/* interface to all architectures [7.6.z] (BZ#2060991)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2186",
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2186.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:49:53+00:00",
"generator": {
"date": "2024-11-15T14:49:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:2186",
"initial_release_date": "2022-05-11T16:44:20+00:00",
"revision_history": [
{
"date": "2022-05-11T16:44:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T16:44:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:49:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.src",
"product_id": "kernel-0:3.10.0-957.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T16:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T16:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
RHSA-2022:1373
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1373",
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1373.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:24+00:00",
"generator": {
"date": "2025-10-09T21:12:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1373",
"initial_release_date": "2022-04-13T20:07:15+00:00",
"revision_history": [
{
"date": "2022-04-13T20:07:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-13T20:07:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_63_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T20:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1373"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_63_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_1555
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.5.z4 source tree (BZ#2067266)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1555",
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1555.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:48:49+00:00",
"generator": {
"date": "2024-11-15T14:48:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1555",
"initial_release_date": "2022-04-26T17:13:14+00:00",
"revision_history": [
{
"date": "2022-04-26T17:13:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T17:13:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:48:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product_id": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.23.1.rt7.153.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T17:13:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T17:13:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022_4896
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)\n\n* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)\n\n* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes:\n\n* elfutils package has been update within RHV-H Channel to match the same version released in RHEL (BZ#2038081)\n\n* Rebase package(s) to version 1.2.24\nFor highlights, important fixes, or notable enhancements: see bugs in \"Depend On\". (BZ#2057338)\n\n* Rebase package(s) to version: 4.5.0\n\nHighlights, important fixes, or notable enhancements: (BZ#2057342)\n\n* Rebase package(s) to version anaconda-33.16.6.6-1.el8\nFor highlights and important bug fixes: include UI change for blocking installation if root password is not set. (BZ#1899821)\n\n* Red hat Virtualization Host has been rebased on Red Hat Enterprise Linux 8.6 (BZ#1997074)\n\n* Previously, concurrent executions of LV refresh (lvchange) failed. This hindered simultaneous starts of virtual machines that have thin-provisioned disks based on the same disk on a block storage domain.\nIn this release, concurrent execution of LV refresh has been fixed in LVM2. (BZ#2020497)\n\n* Red Hat Virtualization Host has been rebased on latest Ceph 4.3 (BZ#2090138)\n\n* In previous releases systemtap package could have been installed on top of RHV-H from RHV-H channel. With 4.4 SP1 systemtap package installation is not supported anymore (BZ#2052963)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:4896",
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1899821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899821"
},
{
"category": "external",
"summary": "1997074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997074"
},
{
"category": "external",
"summary": "2020497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020497"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2038081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038081"
},
{
"category": "external",
"summary": "2052963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052963"
},
{
"category": "external",
"summary": "2056334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056334"
},
{
"category": "external",
"summary": "2056745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056745"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "2057338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057338"
},
{
"category": "external",
"summary": "2057342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057342"
},
{
"category": "external",
"summary": "2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "2067945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
},
{
"category": "external",
"summary": "2073310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
},
{
"category": "external",
"summary": "2081353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353"
},
{
"category": "external",
"summary": "2086834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086834"
},
{
"category": "external",
"summary": "2090138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090138"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4896.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]",
"tracking": {
"current_release_date": "2025-01-06T19:56:00+00:00",
"generator": {
"date": "2025-01-06T19:56:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2022:4896",
"initial_release_date": "2022-06-03T13:51:08+00:00",
"revision_history": [
{
"date": "2022-06-03T13:51:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-03T13:51:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:56:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "elfutils-0:0.186-1.el8.src",
"product": {
"name": "elfutils-0:0.186-1.el8.src",
"product_id": "elfutils-0:0.186-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils@0.186-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.24-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.24-1.el8ev.src",
"product_id": "imgbased-0:1.2.24-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product": {
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product_id": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-node-ng@4.4.2-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product": {
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product_id": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.0-202205291010_8.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "elfutils-devel-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-devel-0:0.186-1.el8.x86_64",
"product_id": "elfutils-devel-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-devel@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-client@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debugsource@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-client-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-libelf-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-libs-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.0-5.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.0-202205291010_8.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "imgbased-0:1.2.24-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.24-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.24-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.24-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.0-5.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product": {
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_id": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product": {
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_id": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-0:0.186-1.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src"
},
"product_reference": "elfutils-0:0.186-1.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-devel-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-devel-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src"
},
"product_reference": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.24-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.24-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.24-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src"
},
"product_reference": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch"
},
"product_reference": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch"
},
"product_reference": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067945"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug was introduced in zlib v1.2.2.2 through zlib v1.2.11, with the addition of the Z_FIXED option, which forces the use of fixed Huffman codes, rather than dynamic Huffman codes, allowing for a simpler decoder for special applications.\n\nThis bug is difficult to trigger, as Z_FIXED is usually only used in special circumstances.\n\nRsync does the compression in-transit using zlib. As rsync uses vulnerable zlib v1.2.8 package, which incorrectly handles memory when performing certain zlib compressing or deflating operations. This results in rsync to crash.\n\nNote - The issue wasn\u0027t publicly labelled as security vulnerability until 2022, but the fix was public since 2018.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-25032"
},
{
"category": "external",
"summary": "RHBZ#2067945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032"
}
],
"release_date": "2018-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2022-03-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2062202"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0778"
},
{
"category": "external",
"summary": "RHBZ#2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20220315.txt",
"url": "https://www.openssl.org/news/secadv/20220315.txt"
}
],
"release_date": "2022-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates"
},
{
"cve": "CVE-2022-1271",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-04-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073310"
}
],
"notes": [
{
"category": "description",
"text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gzip: arbitrary-file-write vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug was introduced in gzip-1.3.10 and is relatively hard to exploit.\n\nRed Hat Enterprise Linux 6 was affected but Out of Support Cycle because gzip was not listed in Red Hat Enterprise Linux 6 ELS Inclusion List.\nhttps://access.redhat.com/articles/4997301",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1271"
},
{
"category": "external",
"summary": "RHBZ#2073310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271"
}
],
"release_date": "2022-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gzip: arbitrary-file-write vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Pieter Agten"
],
"organization": "Fortanix"
}
],
"cve": "CVE-2022-24903",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2081353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsyslog\u0027s reception TCP modules. This flaw allows an attacker to craft a malicious message leading to a heap-based buffer overflow. This issue allows the attacker to corrupt or access data stored in memory, leading to a denial of service in the rsyslog or possible remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsyslog: Heap-based overflow in TCP syslog server",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24903"
},
{
"category": "external",
"summary": "RHBZ#2081353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903"
},
{
"category": "external",
"summary": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8",
"url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8"
}
],
"release_date": "2022-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsyslog: Heap-based overflow in TCP syslog server"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
RHSA-2022:0823
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: improper initialization of the \"flags\" member of the new pipe_buffer (CVE-2022-0847)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0823",
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "2060795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0823.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:20+00:00",
"generator": {
"date": "2025-10-09T21:12:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0823",
"initial_release_date": "2022-03-10T15:33:47+00:00",
"revision_history": [
{
"date": "2022-03-10T15:33:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-10T15:33:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.64.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.64.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Max Kellermann"
],
"organization": "CM4all"
}
],
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"discovery_date": "2022-03-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nNote that PIPE_BUF_FLAG_CAN_MERGE flag attack vector is not available in Red Hat Enterprise Linux 8 and thus the currently known exploits leveraging this flag do not work. The underlying issue (lack of proper pipe_buffer structure initialization) is still present though and other novel ways leading to successful exploitation cannot be fully ruled out.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0847"
},
{
"category": "external",
"summary": "RHBZ#2060795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795"
},
{
"category": "external",
"summary": "RHSB-2022-002",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847"
},
{
"category": "external",
"summary": "https://dirtypipe.cm4all.com/",
"url": "https://dirtypipe.cm4all.com/"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-03-07T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Currently there is no mitigation available for this flaw. Customers should update to fixed packages, once they are available.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-04-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022:1535
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1535",
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1535.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:42:26+00:00",
"generator": {
"date": "2025-10-09T21:42:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1535",
"initial_release_date": "2022-04-26T20:00:25+00:00",
"revision_history": [
{
"date": "2022-04-26T20:00:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T20:00:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debugsource@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debuginfo@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debugsource@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debuginfo@1-3.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debugsource@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debuginfo@1-2.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debugsource@1-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product_id": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debuginfo@1-1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debugsource@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1-debuginfo@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debugsource@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1-debuginfo@1-3.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debugsource@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2-debuginfo@1-2.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1@1-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debugsource@1-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product_id": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1-debuginfo@1-1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T20:00:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T20:00:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1535"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debuginfo-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_12_2-debugsource-0:1-2.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debuginfo-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_20_1-debugsource-0:1-1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_2_1-debugsource-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debuginfo-0:1-3.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kpatch-patch-4_18_0-348_7_1-debugsource-0:1-3.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022:1324
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* guest using rtl8139 can not connect to network (BZ#2063889)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1324",
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1324.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:24+00:00",
"generator": {
"date": "2025-10-09T21:12:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1324",
"initial_release_date": "2022-04-12T15:52:54+00:00",
"revision_history": [
{
"date": "2022-04-12T15:52:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-12T15:52:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.66.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.66.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_0851
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0851",
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0851.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T14:43:52+00:00",
"generator": {
"date": "2024-11-15T14:43:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0851",
"initial_release_date": "2022-03-14T10:22:02+00:00",
"revision_history": [
{
"date": "2022-03-14T10:22:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-14T10:22:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:43:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debugsource@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debuginfo@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debugsource@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debuginfo@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_0590
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0590",
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0590.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T10:48:12+00:00",
"generator": {
"date": "2024-11-15T10:48:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0590",
"initial_release_date": "2022-02-22T09:05:00+00:00",
"revision_history": [
{
"date": "2022-02-22T09:05:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T09:05:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:48:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
RHSA-2022:1324
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* guest using rtl8139 can not connect to network (BZ#2063889)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1324",
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1324.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:24+00:00",
"generator": {
"date": "2025-10-09T21:12:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1324",
"initial_release_date": "2022-04-12T15:52:54+00:00",
"revision_history": [
{
"date": "2022-04-12T15:52:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-12T15:52:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.66.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.66.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.66.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.66.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-12T15:52:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.66.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.66.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
RHSA-2022:1555
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.5.z4 source tree (BZ#2067266)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1555",
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1555.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:27+00:00",
"generator": {
"date": "2025-10-09T21:42:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1555",
"initial_release_date": "2022-04-26T17:13:14+00:00",
"revision_history": [
{
"date": "2022-04-26T17:13:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T17:13:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product_id": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.23.1.rt7.153.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T17:13:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T17:13:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
RHSA-2022:2186
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Extend /sys/devices/system/cpu/smt/* interface to all architectures [7.6.z] (BZ#2060991)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2186",
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2186.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:29+00:00",
"generator": {
"date": "2025-10-09T21:42:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:2186",
"initial_release_date": "2022-05-11T16:44:20+00:00",
"revision_history": [
{
"date": "2022-05-11T16:44:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T16:44:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.src",
"product_id": "kernel-0:3.10.0-957.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.94.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T16:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T16:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.94.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.94.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
rhsa-2022_2189
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2189",
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2189.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T14:49:31+00:00",
"generator": {
"date": "2024-11-15T14:49:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:2189",
"initial_release_date": "2022-05-11T13:25:42+00:00",
"revision_history": [
{
"date": "2022-05-11T13:25:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T13:25:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:49:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.101.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.101.1.el7.src",
"product_id": "kernel-0:3.10.0-514.101.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.101.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.101.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.101.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.101.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.101.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:25:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.101.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.101.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.101.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
RHSA-2022:1198
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Adding new kernel entry in grub configuration file only after generation of new initramfs (BZ#1893756)\n\n* Cannot mount DFS shares on RHEL7 (BZ#1937304)\n\n* RHEL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware (BZ#1997156)\n\n* kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 (BZ#2028740)\n\n* Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c (BZ#2030609)\n\n* [RHEL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info (BZ#2042462)\n\n* REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. (BZ#2054743)\n\nEnhancement(s):\n\n* RHEL7.9 - kernel: Add support for CPU-MF counter second version 7 (BZ#2048920)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1198",
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1198.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T21:42:23+00:00",
"generator": {
"date": "2025-10-09T21:42:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1198",
"initial_release_date": "2022-04-05T17:30:30+00:00",
"revision_history": [
{
"date": "2022-04-05T17:30:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T17:30:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.62.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.62.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.62.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.62.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:30:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:30:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.62.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.62.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.62.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022_0823
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: improper initialization of the \"flags\" member of the new pipe_buffer (CVE-2022-0847)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0823",
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "2060795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0823.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T14:43:22+00:00",
"generator": {
"date": "2024-11-15T14:43:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0823",
"initial_release_date": "2022-03-10T15:33:47+00:00",
"revision_history": [
{
"date": "2022-03-10T15:33:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-10T15:33:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:43:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.64.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.64.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Max Kellermann"
],
"organization": "CM4all"
}
],
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"discovery_date": "2022-03-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nNote that PIPE_BUF_FLAG_CAN_MERGE flag attack vector is not available in Red Hat Enterprise Linux 8 and thus the currently known exploits leveraging this flag do not work. The underlying issue (lack of proper pipe_buffer structure initialization) is still present though and other novel ways leading to successful exploitation cannot be fully ruled out.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0847"
},
{
"category": "external",
"summary": "RHBZ#2060795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795"
},
{
"category": "external",
"summary": "RHSB-2022-002",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847"
},
{
"category": "external",
"summary": "https://dirtypipe.cm4all.com/",
"url": "https://dirtypipe.cm4all.com/"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-03-07T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Currently there is no mitigation available for this flaw. Customers should update to fixed packages, once they are available.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-04-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_2188
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2188",
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2188.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T10:52:09+00:00",
"generator": {
"date": "2024-11-15T10:52:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:2188",
"initial_release_date": "2022-05-11T13:28:33+00:00",
"revision_history": [
{
"date": "2022-05-11T13:28:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T13:28:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:52:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.100.1.el7.src",
"product_id": "kernel-0:3.10.0-693.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T13:28:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.100.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.100.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
}
]
}
rhsa-2022_1263
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\n* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)\n\n* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)\n\n* expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution (CVE-2022-25236)\n\n* expat: Integer overflow in storeRawNames() (CVE-2022-25315)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHV-H has been rebased on RHEL-7.9.z #13 (BZ#2048409)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1263",
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "2041489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048409"
},
{
"category": "external",
"summary": "2055326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326"
},
{
"category": "external",
"summary": "2056363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363"
},
{
"category": "external",
"summary": "2056366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366"
},
{
"category": "external",
"summary": "2056370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370"
},
{
"category": "external",
"summary": "2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1263.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.22",
"tracking": {
"current_release_date": "2025-01-06T19:55:14+00:00",
"generator": {
"date": "2025-01-06T19:55:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2022:1263",
"initial_release_date": "2022-04-07T09:05:42+00:00",
"revision_history": [
{
"date": "2022-04-07T09:05:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-07T09:05:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:55:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.22-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.22-20220330.1.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
},
{
"cve": "CVE-2021-45417",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2041489"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aide: heap-based buffer overflow on outputs larger than B64_BUF",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45417"
},
{
"category": "external",
"summary": "RHBZ#2041489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417"
}
],
"release_date": "2022-01-20T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "aide: heap-based buffer overflow on outputs larger than B64_BUF"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2022-03-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2062202"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0778"
},
{
"category": "external",
"summary": "RHBZ#2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20220315.txt",
"url": "https://www.openssl.org/news/secadv/20220315.txt"
}
],
"release_date": "2022-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
},
{
"cve": "CVE-2022-24407",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2022-02-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2055326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SQL plugin shipped with Cyrus SASL. The vulnerability occurs due to failure to properly escape SQL input and leads to an improper input validation vulnerability. This flaw allows an attacker to execute arbitrary SQL commands and the ability to change the passwords for other accounts allowing escalation of privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24407"
},
{
"category": "external",
"summary": "RHBZ#2055326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407"
},
{
"category": "external",
"summary": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28",
"url": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28"
}
],
"release_date": "2022-02-22T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands"
},
{
"cve": "CVE-2022-25235",
"cwe": {
"id": "CWE-838",
"name": "Inappropriate Encoding for Output Context"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in expat. Passing malformed 2- and 3-byte UTF-8 sequences (for example, from start tag names) to the XML processing application on top of expat can lead to arbitrary code execution. This issue is dependent on how invalid UTF-8 is handled inside the XML processor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25235"
},
{
"category": "external",
"summary": "RHBZ#2056366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
},
{
"cve": "CVE-2022-25236",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056370"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in expat. Passing one or more namespace separator characters in the \"xmlns[:prefix]\" attribute values made expat send malformed tag names to the XML processor on top of expat. This issue causes arbitrary code execution depending on how unexpected cases are handled inside the XML processor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.\n\nThe xmlrpc-c component as shipped with Red Hat Enterprise Linux 8 is not affected by this issue as the issue could not be reproduced in this version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "RHBZ#2056370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
},
{
"cve": "CVE-2022-25315",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056363"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow was found in expat. The issue occurs in storeRawNames() by abusing the m_buffer expansion logic to allow allocations very close to INT_MAX and out-of-bounds heap writes. This flaw can cause a denial of service or potentially arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Integer overflow in storeRawNames()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25315"
},
{
"category": "external",
"summary": "RHBZ#2056363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315"
},
{
"category": "external",
"summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/",
"url": "https://blog.hartwork.org/posts/expat-2-4-5-released/"
}
],
"release_date": "2022-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T09:05:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1263"
},
{
"category": "workaround",
"details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: Integer overflow in storeRawNames()"
}
]
}
rhsa-2022:0823
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: improper initialization of the \"flags\" member of the new pipe_buffer (CVE-2022-0847)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0823",
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "2060795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0823.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:20+00:00",
"generator": {
"date": "2025-10-09T21:12:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0823",
"initial_release_date": "2022-03-10T15:33:47+00:00",
"revision_history": [
{
"date": "2022-03-10T15:33:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-10T15:33:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.64.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.64.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.64.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.64.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.64.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.64.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Max Kellermann"
],
"organization": "CM4all"
}
],
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"discovery_date": "2022-03-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nNote that PIPE_BUF_FLAG_CAN_MERGE flag attack vector is not available in Red Hat Enterprise Linux 8 and thus the currently known exploits leveraging this flag do not work. The underlying issue (lack of proper pipe_buffer structure initialization) is still present though and other novel ways leading to successful exploitation cannot be fully ruled out.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0847"
},
{
"category": "external",
"summary": "RHBZ#2060795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795"
},
{
"category": "external",
"summary": "RHSB-2022-002",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847"
},
{
"category": "external",
"summary": "https://dirtypipe.cm4all.com/",
"url": "https://dirtypipe.cm4all.com/"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-03-07T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Currently there is no mitigation available for this flaw. Customers should update to fixed packages, once they are available.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-04-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-10T15:33:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.64.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.64.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.64.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
RHSA-2022:4896
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)\n\n* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)\n\n* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes:\n\n* elfutils package has been update within RHV-H Channel to match the same version released in RHEL (BZ#2038081)\n\n* Rebase package(s) to version 1.2.24\nFor highlights, important fixes, or notable enhancements: see bugs in \"Depend On\". (BZ#2057338)\n\n* Rebase package(s) to version: 4.5.0\n\nHighlights, important fixes, or notable enhancements: (BZ#2057342)\n\n* Rebase package(s) to version anaconda-33.16.6.6-1.el8\nFor highlights and important bug fixes: include UI change for blocking installation if root password is not set. (BZ#1899821)\n\n* Red hat Virtualization Host has been rebased on Red Hat Enterprise Linux 8.6 (BZ#1997074)\n\n* Previously, concurrent executions of LV refresh (lvchange) failed. This hindered simultaneous starts of virtual machines that have thin-provisioned disks based on the same disk on a block storage domain.\nIn this release, concurrent execution of LV refresh has been fixed in LVM2. (BZ#2020497)\n\n* Red Hat Virtualization Host has been rebased on latest Ceph 4.3 (BZ#2090138)\n\n* In previous releases systemtap package could have been installed on top of RHV-H from RHV-H channel. With 4.4 SP1 systemtap package installation is not supported anymore (BZ#2052963)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:4896",
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1899821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899821"
},
{
"category": "external",
"summary": "1997074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997074"
},
{
"category": "external",
"summary": "2020497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020497"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2038081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038081"
},
{
"category": "external",
"summary": "2052963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052963"
},
{
"category": "external",
"summary": "2056334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056334"
},
{
"category": "external",
"summary": "2056745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056745"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "2057338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057338"
},
{
"category": "external",
"summary": "2057342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057342"
},
{
"category": "external",
"summary": "2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "2067945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
},
{
"category": "external",
"summary": "2073310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
},
{
"category": "external",
"summary": "2081353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353"
},
{
"category": "external",
"summary": "2086834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086834"
},
{
"category": "external",
"summary": "2090138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090138"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4896.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]",
"tracking": {
"current_release_date": "2025-10-09T18:44:10+00:00",
"generator": {
"date": "2025-10-09T18:44:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:4896",
"initial_release_date": "2022-06-03T13:51:08+00:00",
"revision_history": [
{
"date": "2022-06-03T13:51:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-03T13:51:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:44:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "elfutils-0:0.186-1.el8.src",
"product": {
"name": "elfutils-0:0.186-1.el8.src",
"product_id": "elfutils-0:0.186-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils@0.186-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.24-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.24-1.el8ev.src",
"product_id": "imgbased-0:1.2.24-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product": {
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product_id": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-node-ng@4.4.2-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product": {
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product_id": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.0-202205291010_8.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "elfutils-devel-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-devel-0:0.186-1.el8.x86_64",
"product_id": "elfutils-devel-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-devel@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-client@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debugsource@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-client-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-debuginfod-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-libelf-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product": {
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product_id": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/elfutils-libs-debuginfo@0.186-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.0-5.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.0-202205291010_8.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "imgbased-0:1.2.24-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.24-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.24-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.24-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.0-5.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product": {
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_id": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product": {
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_id": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-0:0.186-1.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src"
},
"product_reference": "elfutils-0:0.186-1.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-debugsource-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-debugsource-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-devel-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-devel-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64"
},
"product_reference": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src"
},
"product_reference": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.24-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.24-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.24-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-node-ng-0:4.4.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src"
},
"product_reference": "ovirt-node-ng-0:4.4.2-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch"
},
"product_reference": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.24-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch"
},
"product_reference": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067945"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug was introduced in zlib v1.2.2.2 through zlib v1.2.11, with the addition of the Z_FIXED option, which forces the use of fixed Huffman codes, rather than dynamic Huffman codes, allowing for a simpler decoder for special applications.\n\nThis bug is difficult to trigger, as Z_FIXED is usually only used in special circumstances.\n\nRsync does the compression in-transit using zlib. As rsync uses vulnerable zlib v1.2.8 package, which incorrectly handles memory when performing certain zlib compressing or deflating operations. This results in rsync to crash.\n\nNote - The issue wasn\u0027t publicly labelled as security vulnerability until 2022, but the fix was public since 2018.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-25032"
},
{
"category": "external",
"summary": "RHBZ#2067945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032"
}
],
"release_date": "2018-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2022-03-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2062202"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0778"
},
{
"category": "external",
"summary": "RHBZ#2062202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20220315.txt",
"url": "https://www.openssl.org/news/secadv/20220315.txt"
}
],
"release_date": "2022-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates"
},
{
"cve": "CVE-2022-1271",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-04-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073310"
}
],
"notes": [
{
"category": "description",
"text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gzip: arbitrary-file-write vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug was introduced in gzip-1.3.10 and is relatively hard to exploit.\n\nRed Hat Enterprise Linux 6 was affected but Out of Support Cycle because gzip was not listed in Red Hat Enterprise Linux 6 ELS Inclusion List.\nhttps://access.redhat.com/articles/4997301",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1271"
},
{
"category": "external",
"summary": "RHBZ#2073310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271"
}
],
"release_date": "2022-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gzip: arbitrary-file-write vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Pieter Agten"
],
"organization": "Fortanix"
}
],
"cve": "CVE-2022-24903",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2081353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsyslog\u0027s reception TCP modules. This flaw allows an attacker to craft a malicious message leading to a heap-based buffer overflow. This issue allows the attacker to corrupt or access data stored in memory, leading to a denial of service in the rsyslog or possible remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsyslog: Heap-based overflow in TCP syslog server",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24903"
},
{
"category": "external",
"summary": "RHBZ#2081353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903"
},
{
"category": "external",
"summary": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8",
"url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8"
}
],
"release_date": "2022-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsyslog: Heap-based overflow in TCP syslog server"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-03T13:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:4896"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src",
"8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022:1555
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.5.z4 source tree (BZ#2067266)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1555",
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1555.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:27+00:00",
"generator": {
"date": "2025-10-09T21:42:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1555",
"initial_release_date": "2022-04-26T17:13:14+00:00",
"revision_history": [
{
"date": "2022-04-26T17:13:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T17:13:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product_id": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.23.1.rt7.153.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.23.1.rt7.153.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "NFV-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"relates_to_product_reference": "RT-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T17:13:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T17:13:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"NFV-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"NFV-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.src",
"RT-8.5.0.Z.MAIN:kernel-rt-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-devel-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64",
"RT-8.5.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-348.23.1.rt7.153.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
rhsa-2022_2211
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:2211",
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_2211.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T14:49:45+00:00",
"generator": {
"date": "2024-11-15T14:49:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:2211",
"initial_release_date": "2022-05-11T18:59:08+00:00",
"revision_history": [
{
"date": "2022-05-11T18:59:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-11T18:59:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:49:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_88_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_92_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T18:59:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-11T18:59:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:2211"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_88_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_92_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
}
]
}
RHSA-2022:0636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* bpf: update to v5.7 (BZ#2019883)\n\n* Backport leftover migrate_disable BPF related change (BZ#2027687)\n\n* assuming atomic context at include/linux/filter.h:597 (BZ#2043427)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0636",
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0636.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0636",
"initial_release_date": "2022-02-22T15:58:52+00:00",
"revision_history": [
{
"date": "2022-02-22T15:58:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T15:58:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.75.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.75.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
RHSA-2022:0590
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0590",
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0590.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:18+00:00",
"generator": {
"date": "2025-10-09T21:12:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0590",
"initial_release_date": "2022-02-22T09:05:00+00:00",
"revision_history": [
{
"date": "2022-02-22T09:05:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T09:05:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-4.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-4.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_64_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_65_2-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_68_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_70_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_71_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T09:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0590"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-4.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_64_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_65_2-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_68_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_70_1-debugsource-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_71_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
RHSA-2022:0772
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0772",
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0772.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:19+00:00",
"generator": {
"date": "2025-10-09T21:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0772",
"initial_release_date": "2022-03-08T15:46:08+00:00",
"revision_history": [
{
"date": "2022-03-08T15:46:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-08T15:46:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debugsource@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debuginfo@1-7.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-11.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-10.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-8.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debugsource@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debuginfo@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debugsource@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debuginfo@1-6.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-9.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debugsource@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debuginfo@1-5.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debugsource@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_12_1-debuginfo@1-7.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_30_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-11.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_34_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-10.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-8.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debugsource@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_19_1-debuginfo@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debugsource@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_17_1-debuginfo@1-6.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-9.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debugsource@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_25_1-debuginfo@1-5.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_28_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2048738"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow flaw was found in the Linux kernel\u2019s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat recommends to use TIPC Encryption to secure TIPC procotol\u0027s payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "RHBZ#2048738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/10/1",
"url": "https://www.openwall.com/lists/oss-security/2022/02/10/1"
}
],
"release_date": "2022-02-10T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module.\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-08T15:46:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0772"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-11.el8.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-8.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debuginfo-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_12_1-debugsource-0:1-7.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_17_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debuginfo-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_19_1-debugsource-0:1-6.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debuginfo-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_25_1-debugsource-0:1-5.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_28_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_30_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_34_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-10.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-9.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-9.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
RHSA-2022:1550
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport DFS fixes from upstream (BZ#2056329)\n\n* [RHEL8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193)\n\n* nf_reinject calls nf_queue_entry_free on an already freed entry-\u003estate (BZ#2061446)\n\n* gfs2 blocking in gdlm_lock (BZ#2069750)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1550",
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1550.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:27+00:00",
"generator": {
"date": "2025-10-09T21:42:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1550",
"initial_release_date": "2022-04-26T22:22:36+00:00",
"revision_history": [
{
"date": "2022-04-26T22:22:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T22:22:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.23.1.el8_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product_id": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.23.1.el8_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.src",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T22:22:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T22:22:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
RHSA-2022:0851
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0851",
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0851.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:12:22+00:00",
"generator": {
"date": "2025-10-09T21:12:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0851",
"initial_release_date": "2022-03-14T10:22:02+00:00",
"revision_history": [
{
"date": "2022-03-14T10:22:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-14T10:22:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:12:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debugsource@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debuginfo@1-4.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debugsource@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_52_1-debuginfo@1-4.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_54_2-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_56_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_57_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_59_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2022-0330",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042404"
}
],
"notes": [
{
"category": "description",
"text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible privileges escalation due to missing TLB flush",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "RHBZ#2042404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12",
"url": "https://www.openwall.com/lists/oss-security/2022/01/25/12"
}
],
"release_date": "2022-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: possible privileges escalation due to missing TLB flush"
},
{
"acknowledgments": [
{
"names": [
"Yiqi Sun"
],
"organization": "Nebula Lab"
},
{
"names": [
"Kevin Wang"
],
"organization": "Huawei"
}
],
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2022-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2051505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroups v1 release_agent feature may allow privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0492"
},
{
"category": "external",
"summary": "RHBZ#2051505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
}
],
"release_date": "2022-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cgroups v1 release_agent feature may allow privilege escalation"
},
{
"cve": "CVE-2022-22942",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044809"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: failing usercopy allows for use-after-free exploitation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "RHBZ#2044809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942"
}
],
"release_date": "2022-01-27T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-14T10:22:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debuginfo-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_52_1-debugsource-0:1-4.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_54_2-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_56_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_57_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_59_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: failing usercopy allows for use-after-free exploitation"
}
]
}
rhsa-2022_1550
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport DFS fixes from upstream (BZ#2056329)\n\n* [RHEL8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193)\n\n* nf_reinject calls nf_queue_entry_free on an already freed entry-\u003estate (BZ#2061446)\n\n* gfs2 blocking in gdlm_lock (BZ#2069750)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1550",
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1550.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:48:58+00:00",
"generator": {
"date": "2024-11-15T14:48:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1550",
"initial_release_date": "2022-04-26T22:22:36+00:00",
"revision_history": [
{
"date": "2022-04-26T22:22:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T22:22:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:48:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.23.1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.23.1.el8_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product_id": "kernel-0:4.18.0-348.23.1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.23.1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.23.1.el8_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product_id": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.23.1.el8_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.src",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"relates_to_product_reference": "CRB-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T22:22:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2022-25636",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-02-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056830"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap out of bounds write in nf_dup_netdev.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25636"
},
{
"category": "external",
"summary": "RHBZ#2056830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2",
"url": "https://www.openwall.com/lists/oss-security/2022/02/21/2"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T22:22:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"BaseOS-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"BaseOS-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.src",
"CRB-8.5.0.Z.MAIN:kernel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-cross-headers-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-core-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-doc-0:4.18.0-348.23.1.el8_5.noarch",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-modules-extra-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-0:4.18.0-348.23.1.el8_5.x86_64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.aarch64",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.ppc64le",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.s390x",
"CRB-8.5.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-348.23.1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap out of bounds write in nf_dup_netdev.c"
}
]
}
RHSA-2022:1199
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z13 source tree (BZ#2059411)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1199",
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1199.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:42:23+00:00",
"generator": {
"date": "2025-10-09T21:42:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1199",
"initial_release_date": "2022-04-05T17:31:47+00:00",
"revision_history": [
{
"date": "2022-04-05T17:31:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-05T17:31:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:42:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.62.1.rt56.1203.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.62.1.rt56.1203.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.62.1.rt56.1203.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:31:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T17:31:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.62.1.rt56.1203.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.62.1.rt56.1203.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
}
]
}
rhsa-2022_0636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* bpf: update to v5.7 (BZ#2019883)\n\n* Backport leftover migrate_disable BPF related change (BZ#2027687)\n\n* assuming atomic context at include/linux/filter.h:597 (BZ#2043427)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0636",
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0636.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T10:48:39+00:00",
"generator": {
"date": "2024-11-15T10:48:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0636",
"initial_release_date": "2022-02-22T15:58:52+00:00",
"revision_history": [
{
"date": "2022-02-22T15:58:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-22T15:58:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T10:48:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.75.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.75.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.75.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.75.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.75.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.75.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2031930"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0920"
},
{
"category": "external",
"summary": "RHBZ#2031930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Hao Sun"
]
}
],
"cve": "CVE-2021-4028",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in RDMA listen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "RHBZ#2027201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"category": "external",
"summary": "https://lkml.org/lkml/2021/10/4/697",
"url": "https://lkml.org/lkml/2021/10/4/697"
}
],
"release_date": "2021-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in RDMA listen()"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
],
"organization": "Virtuozzo Kernel team"
}
],
"cve": "CVE-2021-4155",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2021-12-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034813"
}
],
"notes": [
{
"category": "description",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "RHBZ#2034813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
}
],
"release_date": "2022-01-10T06:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-22T15:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"category": "workaround",
"details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.75.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.75.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.75.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
}
]
}
ghsa-qfcc-9m6r-r23m
Vulnerability from github
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
{
"affected": [],
"aliases": [
"CVE-2021-4028"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-08-24T16:15:00Z",
"severity": "HIGH"
},
"details": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"id": "GHSA-qfcc-9m6r-r23m",
"modified": "2022-08-29T20:06:48Z",
"published": "2022-08-25T00:00:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"type": "WEB",
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20221228-0002"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2022-AVI-322
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-04-08T00:00:00",
"last_revision_date": "2022-04-08T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-322",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1213 du 05 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1213"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1209 du 05 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1209"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1198 du 05 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1198"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1199 du 05 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1199"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
}
],
"initial_release_date": "2023-01-23T00:00:00",
"last_revision_date": "2023-01-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2022-AVI-228
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-03-10T00:00:00",
"last_revision_date": "2022-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-228",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0777 du 08 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0777"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0771 du 08 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0771"
}
]
}
CERTFR-2022-AVI-108
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4154"
},
{
"name": "CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-4202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4202"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2018-25020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25020"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"name": "CVE-2022-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-46283",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46283"
},
{
"name": "CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
}
],
"initial_release_date": "2022-02-04T00:00:00",
"last_revision_date": "2022-02-04T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220289-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220288-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220288-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220293-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220293-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220291-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220291-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220295-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220295-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220292-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220292-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220296-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220296-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220298-1 du 02 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220298-1/"
}
]
}
CERTFR-2022-AVI-792
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits F5. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NGINX ModSecurity WAF versions R25 ant\u00e9rieures \u00e0 R25+1.0.2-3",
"product": {
"name": "NGINX",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "NGINX ModSecurity WAF versions R24 ant\u00e9rieures \u00e0 R24+1.0.2-2",
"product": {
"name": "NGINX",
"vendor": {
"name": "F5",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-42717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42717"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-09-02T00:00:00",
"last_revision_date": "2022-09-02T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-792",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits F5.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K50839343 du 01 septembre 2022",
"url": "https://support.f5.com/csp/article/K50839343"
}
]
}
CERTFR-2022-AVI-453
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 8 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 8.4 Extended Update Support | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 7 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 8.2 Extended Update Support | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 8",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 8.4 Extended Update Support",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 7",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 8.2 Extended Update Support",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-05-12T00:00:00",
"last_revision_date": "2022-05-12T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:2189 du 11 mai 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:2189"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:2188 du 11 mai 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:2188"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:2186 du 11 mai 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:2186"
}
]
}
CERTFR-2022-AVI-392
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-04-27T00:00:00",
"last_revision_date": "2022-04-27T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-392",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1555 du 26 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1555"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1589 du 26 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1589"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1550 du 26 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1550"
}
]
}
CERTFR-2022-AVI-591
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Plus versions antérieures à 10.1.11 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions antérieures à 8.1.1.15 | ||
| IBM | N/A | IBM® Db2® et Db2 Warehouse® sur Cloud Pak for Data versions antérieures à 4.5.0 | ||
| IBM | Db2 | IBM® Db2® sur Openshift versions antérieures à 11.5.7.0-cn5 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Plus versions ant\u00e9rieures \u00e0 10.1.11",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions ant\u00e9rieures \u00e0 8.1.1.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM\u00ae Db2\u00ae et Db2 Warehouse\u00ae sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM\u00ae Db2\u00ae sur Openshift versions ant\u00e9rieures \u00e0 11.5.7.0-cn5",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2018-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1099"
},
{
"name": "CVE-2021-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4154"
},
{
"name": "CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2019-11249",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11249"
},
{
"name": "CVE-2020-8557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8557"
},
{
"name": "CVE-2020-7919",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7919"
},
{
"name": "CVE-2019-11247",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11247"
},
{
"name": "CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"name": "CVE-2021-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42248"
},
{
"name": "CVE-2018-1002105",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1002105"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2020-15112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15112"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2021-25736",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25736"
},
{
"name": "CVE-2020-27813",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27813"
},
{
"name": "CVE-2018-17848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17848"
},
{
"name": "CVE-2019-16884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16884"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2021-25735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25735"
},
{
"name": "CVE-2017-18367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18367"
},
{
"name": "CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"name": "CVE-2021-20206",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20206"
},
{
"name": "CVE-2019-11246",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11246"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2020-8565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8565"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2018-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1098"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2019-11254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11254"
},
{
"name": "CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"name": "CVE-2020-8551",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8551"
},
{
"name": "CVE-2017-1002101",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1002101"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2020-15106",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15106"
},
{
"name": "CVE-2021-43784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43784"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2018-17142",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17142"
},
{
"name": "CVE-2022-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2020-8552",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8552"
},
{
"name": "CVE-2021-20269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20269"
},
{
"name": "CVE-2020-8554",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8554"
},
{
"name": "CVE-2019-11252",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11252"
},
{
"name": "CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"name": "CVE-2019-11250",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11250"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2020-8559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8559"
},
{
"name": "CVE-2020-10752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10752"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-28852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28852"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2020-15113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15113"
},
{
"name": "CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"name": "CVE-2018-17847",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17847"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2020-26160",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26160"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2020-8555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8555"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2018-17143",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17143"
},
{
"name": "CVE-2019-11841",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11841"
},
{
"name": "CVE-2018-20699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20699"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2019-1002101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1002101"
},
{
"name": "CVE-2021-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
},
{
"name": "CVE-2021-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
},
{
"name": "CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"name": "CVE-2021-3538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3538"
},
{
"name": "CVE-2019-11253",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11253"
},
{
"name": "CVE-2021-25737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25737"
},
{
"name": "CVE-2018-17846",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17846"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2021-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25741"
},
{
"name": "CVE-2018-16886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16886"
},
{
"name": "CVE-2021-44907",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44907"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2020-9283",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9283"
},
{
"name": "CVE-2019-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11840"
},
{
"name": "CVE-2019-11251",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11251"
},
{
"name": "CVE-2020-36067",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36067"
}
],
"initial_release_date": "2022-06-30T00:00:00",
"last_revision_date": "2022-06-30T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-591",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6596399 du 29 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6596399"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6596971 du 29 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6596971"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6599703 du 29 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6599703"
}
]
}
CERTFR-2022-AVI-177
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
}
],
"initial_release_date": "2022-02-23T00:00:00",
"last_revision_date": "2022-02-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-177",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0636 du 22 f\u00e9vrier 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0636"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0620 du 22 f\u00e9vrier 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0620"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0622 du 22 f\u00e9vrier 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0622"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0629 du 22 f\u00e9vrier 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0629"
}
]
}
CERTFR-2022-AVI-100
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4154"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2018-25020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25020"
},
{
"name": "CVE-2022-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
}
],
"initial_release_date": "2022-02-02T00:00:00",
"last_revision_date": "2022-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-100",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220254-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220254-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220257-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220257-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220262-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220262-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220263-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220263-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220270-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220270-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220241-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220241-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220267-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220267-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220255-1 du 01 f\u00e9vrier 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220255-1/"
}
]
}
CERTFR-2022-AVI-354
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64
Sans les correctifs de sécurité BZ-2027201, BZ-2029923, BZ-2031930 et BZ-2044809
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eRed Hat Enterprise Linux Server - AUS 7.7 x86_64\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux Server - TUS 7.7 x86_64\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSans les correctifs de s\u00e9curit\u00e9 BZ-2027201, BZ-2029923, BZ-2031930 et BZ-2044809\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-04-19T00:00:00",
"last_revision_date": "2022-04-19T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-354",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:1324 du 12 avril 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:1324"
}
]
}
CERTFR-2022-AVI-238
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8. | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4154"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
}
],
"initial_release_date": "2022-03-14T00:00:00",
"last_revision_date": "2022-03-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0712 du 01 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0712"
}
],
"reference": "CERTFR-2022-AVI-238",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0819 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0819"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0825 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0825"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0822 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0822"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0823 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0823"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0831 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0831"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0820 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0820"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:0821 du 10 mars 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0821"
}
]
}
fkie_cve-2021-4028
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2021-4028 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2027201 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74 | Mailing List, Patch, Vendor Advisory | |
| secalert@redhat.com | https://lkml.org/lkml/2021/10/4/697 | Mailing List, Patch, Vendor Advisory | |
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20221228-0002/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2021-4028 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2027201 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lkml.org/lkml/2021/10/4/697 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221228-0002/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| suse | linux_enterprise | 15.0 | |
| suse | linux_enterprise | 15.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "247858D3-F7A3-4645-8903-6EDFD43FB0E1",
"versionEndExcluding": "5.10.71",
"versionStartIncluding": "5.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A437B0D-8305-4C72-B691-D26986A126CF",
"versionEndExcluding": "5.14.10",
"versionStartIncluding": "5.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:15.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "D4160B6E-BB1D-4476-877E-5D8CA47226DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:15.0:sp4:*:*:*:*:*:*",
"matchCriteriaId": "A6A1F863-4D18-45F9-86D5-91ED3B38EB47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system."
},
{
"lang": "es",
"value": "Un fallo en la implementaci\u00f3n del kernel de Linux del c\u00f3digo de escucha del administrador de comunicaciones RDMA permit\u00eda a un atacante con acceso local configurar un socket para que escuchara en un puerto alto, lo que permit\u00eda un uso de memoria previamente liberada de un elemento de la lista. Dada la capacidad de ejecutar c\u00f3digo, un atacante local podr\u00eda aprovechar este uso de memoria previamente liberada para bloquear el sistema o posiblemente escalar privilegios en el sistema."
}
],
"id": "CVE-2021-4028",
"lastModified": "2024-11-21T06:36:45.057",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-24T16:15:09.197",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221228-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221228-0002/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "secalert@redhat.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
WID-SEC-W-2022-0515
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0515 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0515 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09",
"url": "https://ubuntu.com/security/notices/USN-6151-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023032948"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596399"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596907"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596881"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596741"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596883"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596971"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596895"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596379"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596877"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596875"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6618019 vom 2022-09-03",
"url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/"
}
],
"source_lang": "en-US",
"title": "IBM Spectrum Protect: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-08T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:29:37.582+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0515",
"initial_release_date": "2022-06-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-06-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-09-04T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-03-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-06-08T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM Spectrum Protect 8.1",
"product": {
"name": "IBM Spectrum Protect 8.1",
"product_id": "T010033",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:8.1"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 10.1",
"product": {
"name": "IBM Spectrum Protect 10.1",
"product_id": "T023649",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-25704"
},
{
"cve": "CVE-2020-29368",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-29368"
},
{
"cve": "CVE-2020-36322",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2020-36385",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-20269",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2021-20321",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-20322",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-21781",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-21781"
},
{
"cve": "CVE-2021-28950",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28971",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31916",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-35550",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35603",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-3573",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3573"
},
{
"cve": "CVE-2021-3635",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3635"
},
{
"cve": "CVE-2021-3669",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3669"
},
{
"cve": "CVE-2021-3764",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3764"
},
{
"cve": "CVE-2021-38201",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-38201"
},
{
"cve": "CVE-2021-38561",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2021-4002",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4002"
},
{
"cve": "CVE-2021-4028",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4028"
},
{
"cve": "CVE-2021-4083",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4083"
},
{
"cve": "CVE-2021-4154",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4154"
},
{
"cve": "CVE-2021-4155",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-41864",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-4197",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4197"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-43565",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-44733",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-44733"
},
{
"cve": "CVE-2021-45485",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-45485"
},
{
"cve": "CVE-2021-45486",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-45486"
},
{
"cve": "CVE-2022-0185",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0185"
},
{
"cve": "CVE-2022-0286",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0286"
},
{
"cve": "CVE-2022-0492",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-0847",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1011",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-22472",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22472"
},
{
"cve": "CVE-2022-22474",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22474"
},
{
"cve": "CVE-2022-22478",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22478"
},
{
"cve": "CVE-2022-22487",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22487"
},
{
"cve": "CVE-2022-22494",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22494"
},
{
"cve": "CVE-2022-22496",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22496"
},
{
"cve": "CVE-2022-22942",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-24675",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24842",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-24842"
},
{
"cve": "CVE-2022-27536",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27536"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-28327"
}
]
}
wid-sec-w-2022-0515
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0515 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0515 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09",
"url": "https://ubuntu.com/security/notices/USN-6151-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023032948"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596399"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596907"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596881"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596741"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596883"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596971"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596895"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596379"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596877"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2022-06-29",
"url": "https://www.ibm.com/support/pages/node/6596875"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6618019 vom 2022-09-03",
"url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/"
}
],
"source_lang": "en-US",
"title": "IBM Spectrum Protect: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-08T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:29:37.582+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0515",
"initial_release_date": "2022-06-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-06-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-09-04T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-03-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-06-08T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM Spectrum Protect 8.1",
"product": {
"name": "IBM Spectrum Protect 8.1",
"product_id": "T010033",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:8.1"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 10.1",
"product": {
"name": "IBM Spectrum Protect 10.1",
"product_id": "T023649",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-25704"
},
{
"cve": "CVE-2020-29368",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-29368"
},
{
"cve": "CVE-2020-36322",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2020-36385",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-20269",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2021-20321",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-20322",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-21781",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-21781"
},
{
"cve": "CVE-2021-28950",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28971",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31916",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-35550",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35603",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-3573",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3573"
},
{
"cve": "CVE-2021-3635",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3635"
},
{
"cve": "CVE-2021-3669",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3669"
},
{
"cve": "CVE-2021-3764",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3764"
},
{
"cve": "CVE-2021-38201",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-38201"
},
{
"cve": "CVE-2021-38561",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2021-4002",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4002"
},
{
"cve": "CVE-2021-4028",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4028"
},
{
"cve": "CVE-2021-4083",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4083"
},
{
"cve": "CVE-2021-4154",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4154"
},
{
"cve": "CVE-2021-4155",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-41864",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-4197",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4197"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-43565",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-44733",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-44733"
},
{
"cve": "CVE-2021-45485",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-45485"
},
{
"cve": "CVE-2021-45486",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2021-45486"
},
{
"cve": "CVE-2022-0185",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0185"
},
{
"cve": "CVE-2022-0286",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0286"
},
{
"cve": "CVE-2022-0492",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-0847",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1011",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-22472",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22472"
},
{
"cve": "CVE-2022-22474",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22474"
},
{
"cve": "CVE-2022-22478",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22478"
},
{
"cve": "CVE-2022-22487",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22487"
},
{
"cve": "CVE-2022-22494",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22494"
},
{
"cve": "CVE-2022-22496",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22496"
},
{
"cve": "CVE-2022-22942",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-24675",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24842",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-24842"
},
{
"cve": "CVE-2022-27536",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27536"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T023649",
"T000126",
"T010033",
"398363"
]
},
"release_date": "2022-06-29T22:00:00.000+00:00",
"title": "CVE-2022-28327"
}
]
}
suse-su-2022:0257-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_10 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).\n- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).\n- CVE-2021-4028: Fixed use-after-free in RDMA listen() that could lead to DoS or privilege escalation by a local attacker (bsc#1193167).\n- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-257,SUSE-SLE-Module-Live-Patching-15-SP3-2022-257,SUSE-SLE-Module-Live-Patching-15-SP3-2022-258,SUSE-SLE-Module-Live-Patching-15-SP3-2022-269",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0257-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0257-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220257-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0257-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html"
},
{
"category": "self",
"summary": "SUSE Bug 1191529",
"url": "https://bugzilla.suse.com/1191529"
},
{
"category": "self",
"summary": "SUSE Bug 1192036",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "self",
"summary": "SUSE Bug 1193529",
"url": "https://bugzilla.suse.com/1193529"
},
{
"category": "self",
"summary": "SUSE Bug 1194461",
"url": "https://bugzilla.suse.com/1194461"
},
{
"category": "self",
"summary": "SUSE Bug 1194737",
"url": "https://bugzilla.suse.com/1194737"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4028 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-02-01T11:16:05Z",
"generator": {
"date": "2022-02-01T11:16:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0257-1",
"initial_release_date": "2022-02-01T11:16:05Z",
"revision_history": [
{
"date": "2022-02-01T11:16:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-preempt-7-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-preempt-7-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_16-preempt-7-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:05Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2021-4028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4028"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4028",
"url": "https://www.suse.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "SUSE Bug 1193167 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193167"
},
{
"category": "external",
"summary": "SUSE Bug 1193529 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:05Z",
"details": "important"
}
],
"title": "CVE-2021-4028"
},
{
"cve": "CVE-2021-4154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4154"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel\u0027s cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4154",
"url": "https://www.suse.com/security/cve/CVE-2021-4154"
},
{
"category": "external",
"summary": "SUSE Bug 1193842 for CVE-2021-4154",
"url": "https://bugzilla.suse.com/1193842"
},
{
"category": "external",
"summary": "SUSE Bug 1194461 for CVE-2021-4154",
"url": "https://bugzilla.suse.com/1194461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:05Z",
"details": "important"
}
],
"title": "CVE-2021-4154"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:05Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-7-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-6-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:05Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
}
]
}
suse-su-2022:0293-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).\n- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).\n- CVE-2021-4028: Fixed use-after-free in RDMA listen() that could lead to DoS or privilege escalation by a local attacker (bsc#1193167).\n- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-293,SUSE-SLE-Module-Live-Patching-15-SP3-2022-293",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0293-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0293-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220293-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0293-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1191529",
"url": "https://bugzilla.suse.com/1191529"
},
{
"category": "self",
"summary": "SUSE Bug 1192036",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "self",
"summary": "SUSE Bug 1193529",
"url": "https://bugzilla.suse.com/1193529"
},
{
"category": "self",
"summary": "SUSE Bug 1194461",
"url": "https://bugzilla.suse.com/1194461"
},
{
"category": "self",
"summary": "SUSE Bug 1194680",
"url": "https://bugzilla.suse.com/1194680"
},
{
"category": "self",
"summary": "SUSE Bug 1194737",
"url": "https://bugzilla.suse.com/1194737"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4028 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-02-02T09:03:07Z",
"generator": {
"date": "2022-02-02T09:03:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0293-1",
"initial_release_date": "2022-02-02T09:03:07Z",
"revision_history": [
{
"date": "2022-02-02T09:03:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"product_id": "kernel-livepatch-5_3_18-57-default-10-3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-preempt-10-3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-57-preempt-10-3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-57-preempt-10-3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-10-3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-10-3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-4028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4028"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4028",
"url": "https://www.suse.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "SUSE Bug 1193167 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193167"
},
{
"category": "external",
"summary": "SUSE Bug 1193529 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2021-4028"
},
{
"cve": "CVE-2021-4154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4154"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel\u0027s cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4154",
"url": "https://www.suse.com/security/cve/CVE-2021-4154"
},
{
"category": "external",
"summary": "SUSE Bug 1193842 for CVE-2021-4154",
"url": "https://bugzilla.suse.com/1193842"
},
{
"category": "external",
"summary": "SUSE Bug 1194461 for CVE-2021-4154",
"url": "https://bugzilla.suse.com/1194461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2021-4154"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-10-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:07Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
}
]
}
suse-su-2022:0295-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_13 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).\n- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).\n- CVE-2021-4028: Fixed use-after-free in RDMA listen() that could lead to DoS or privilege escalation by a local attacker (bsc#1193167).\n- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-295,SUSE-SLE-Module-Live-Patching-15-SP3-2022-294,SUSE-SLE-Module-Live-Patching-15-SP3-2022-295",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0295-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0295-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220295-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0295-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html"
},
{
"category": "self",
"summary": "SUSE Bug 1191529",
"url": "https://bugzilla.suse.com/1191529"
},
{
"category": "self",
"summary": "SUSE Bug 1192036",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "self",
"summary": "SUSE Bug 1193529",
"url": "https://bugzilla.suse.com/1193529"
},
{
"category": "self",
"summary": "SUSE Bug 1194461",
"url": "https://bugzilla.suse.com/1194461"
},
{
"category": "self",
"summary": "SUSE Bug 1194737",
"url": "https://bugzilla.suse.com/1194737"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4028 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-02-02T09:03:32Z",
"generator": {
"date": "2022-02-02T09:03:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0295-1",
"initial_release_date": "2022-02-02T09:03:32Z",
"revision_history": [
{
"date": "2022-02-02T09:03:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-preempt-8-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-preempt-8-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_13-preempt-8-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:32Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2021-4028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4028"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4028",
"url": "https://www.suse.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "SUSE Bug 1193167 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193167"
},
{
"category": "external",
"summary": "SUSE Bug 1193529 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:32Z",
"details": "important"
}
],
"title": "CVE-2021-4028"
},
{
"cve": "CVE-2021-4154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4154"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel\u0027s cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4154",
"url": "https://www.suse.com/security/cve/CVE-2021-4154"
},
{
"category": "external",
"summary": "SUSE Bug 1193842 for CVE-2021-4154",
"url": "https://bugzilla.suse.com/1193842"
},
{
"category": "external",
"summary": "SUSE Bug 1194461 for CVE-2021-4154",
"url": "https://bugzilla.suse.com/1194461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:32Z",
"details": "important"
}
],
"title": "CVE-2021-4154"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:32Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-8-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-8-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-02T09:03:32Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
}
]
}
suse-su-2022:0270-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_27 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).\n- CVE-2021-4028: Fixed use-after-free in RDMA listen() that could lead to DoS or privilege escalation by a local attacker (bsc#1193167).\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-270,SUSE-SLE-Module-Live-Patching-15-SP3-2022-259,SUSE-SLE-Module-Live-Patching-15-SP3-2022-270",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0270-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0270-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220270-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0270-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html"
},
{
"category": "self",
"summary": "SUSE Bug 1192036",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "self",
"summary": "SUSE Bug 1193529",
"url": "https://bugzilla.suse.com/1193529"
},
{
"category": "self",
"summary": "SUSE Bug 1194737",
"url": "https://bugzilla.suse.com/1194737"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4028 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-02-01T11:16:09Z",
"generator": {
"date": "2022-02-01T11:16:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0270-1",
"initial_release_date": "2022-02-01T11:16:09Z",
"revision_history": [
{
"date": "2022-02-01T11:16:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_27-preempt-4-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_27-preempt-4-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_27-preempt-4-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4028"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4028",
"url": "https://www.suse.com/security/cve/CVE-2021-4028"
},
{
"category": "external",
"summary": "SUSE Bug 1193167 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193167"
},
{
"category": "external",
"summary": "SUSE Bug 1193529 for CVE-2021-4028",
"url": "https://bugzilla.suse.com/1193529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:09Z",
"details": "important"
}
],
"title": "CVE-2021-4028"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:09Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-4-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-4-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-01T11:16:09Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
}
]
}
cnvd-2022-69197
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: http://bugzilla.redhat.com/show_bug.cgi?id=2027201
| Name | Linux Linux kernel <5.1.15 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-4028",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u4e8e\u5728RDMA\u901a\u4fe1\u7ba1\u7406\u5668\u4fa6\u542c\u5668\u4ee3\u7801\u7684\u5b9e\u73b0\u4e2d\u91ca\u653e\u540e\u4f7f\u7528\u9020\u6210\u7684\u3002\u901a\u8fc7\u53d1\u9001\u7cbe\u5fc3\u7f16\u5236\u7684\u8bf7\u6c42\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u4f7f\u7cfb\u7edf\u5d29\u6e83\u6216\u83b7\u5f97\u7cfb\u7edf\u4e0a\u7684\u63d0\u5347\u6743\u9650\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://bugzilla.redhat.com/show_bug.cgi?id=2027201",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-69197",
"openTime": "2022-10-17",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u4e8e\u5728RDMA\u901a\u4fe1\u7ba1\u7406\u5668\u4fa6\u542c\u5668\u4ee3\u7801\u7684\u5b9e\u73b0\u4e2d\u91ca\u653e\u540e\u4f7f\u7528\u9020\u6210\u7684\u3002\u901a\u8fc7\u53d1\u9001\u7cbe\u5fc3\u7f16\u5236\u7684\u8bf7\u6c42\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u4f7f\u7cfb\u7edf\u5d29\u6e83\u6216\u83b7\u5f97\u7cfb\u7edf\u4e0a\u7684\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2022-69197\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel \u003c5.1.15"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"serverity": "\u9ad8",
"submitTime": "2022-02-24",
"title": "Linux kernel\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2022-69197\uff09"
}
gsd-2021-4028
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-4028",
"description": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"id": "GSD-2021-4028",
"references": [
"https://www.suse.com/security/cve/CVE-2021-4028.html",
"https://access.redhat.com/errata/RHSA-2022:0777",
"https://access.redhat.com/errata/RHSA-2022:0772",
"https://access.redhat.com/errata/RHSA-2022:0771",
"https://access.redhat.com/errata/RHSA-2022:0636",
"https://access.redhat.com/errata/RHSA-2022:0629",
"https://access.redhat.com/errata/RHSA-2022:0590",
"https://access.redhat.com/errata/RHSA-2022:0823",
"https://security.archlinux.org/CVE-2021-4028",
"https://access.redhat.com/errata/RHSA-2022:0958",
"https://access.redhat.com/errata/RHSA-2022:1185",
"https://access.redhat.com/errata/RHSA-2022:1198",
"https://access.redhat.com/errata/RHSA-2022:1199",
"https://access.redhat.com/errata/RHSA-2022:1263",
"https://access.redhat.com/errata/RHSA-2022:1324",
"https://access.redhat.com/errata/RHSA-2022:1373",
"https://access.redhat.com/errata/RHSA-2022:1535",
"https://access.redhat.com/errata/RHSA-2022:1550",
"https://access.redhat.com/errata/RHSA-2022:1555",
"https://linux.oracle.com/cve/CVE-2021-4028.html",
"https://access.redhat.com/errata/RHSA-2022:2186",
"https://access.redhat.com/errata/RHSA-2022:2188",
"https://access.redhat.com/errata/RHSA-2022:2189",
"https://access.redhat.com/errata/RHSA-2022:2211",
"https://access.redhat.com/errata/RHSA-2022:4896",
"https://access.redhat.com/errata/RHSA-2022:0851"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-4028"
],
"details": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",
"id": "GSD-2021-4028",
"modified": "2023-12-13T01:23:11.507450Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-4028",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "kernel",
"version": {
"version_data": [
{
"version_value": "Fixed in kernel 5.15-rc1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416 - Use After Free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lkml.org/lkml/2021/10/4/697",
"refsource": "MISC",
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2021-4028",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0",
"refsource": "MISC",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221228-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20221228-0002/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.10.71",
"versionStartIncluding": "5.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.14.10",
"versionStartIncluding": "5.11",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise:15.0:sp4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise:15.0:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-4028"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lkml.org/lkml/2021/10/4/697",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://lkml.org/lkml/2021/10/4/697"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2021-4028",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2021-4028"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221228-0002/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221228-0002/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-02-10T16:18Z",
"publishedDate": "2022-08-24T16:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.